Role in IT decision-making process:Align Business & IT GoalsCreate IT StrategyDetermine IT NeedsManage Vendor RelationshipsEvaluate/Specify Brands or VendorsOther RoleAuthorize PurchasesNot Involved

Work Phone:

Company:

Company Size:

Industry:

Street Address

City:

Zip/postal code

State/Province:

Country:

Occasionally, we send subscribers special offers from select partners. Would you like to receive these special partner offers via e-mail?YesNo

Your registration with Eweek will include the following free email newsletter(s):News & Views

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

WEBINAR:On-Demand

For the second time in as many months, a private security research company has discovered high-risk vulnerabilities in two of Microsofts most widely used software programs.

Security consultants at eEye Digital Security privately reported the newly discovered flaws to the software giant on May 5 and warned that users of the dominant Internet Explorer browser and the Microsoft Outlook e-mail client were at risk of PC hijack attacks.

"A vulnerability in default installations of the affected software allows malicious code to be executed, contingent upon minimal user interaction," eEye said in a notice posted on its upcoming advisories Web page.

The company said additional miscellaneous titles are also affected by the remote code execution flaw, which is rated "high risk" and could cause remote code execution attacks.

Marc Maiffret, eEyes co-founder and chief hacking officer, told Ziff Davis Internet News that the vulnerability carries the highest severity rating because of the "ease with which an attacker can compromise a vulnerable system."

"Microsoft has acknowledged these issues and were working with them to get a fix ready," Maiffret said, noting that eEyes disclosure policy is to withhold vulnerability details until a vendor-supplied patch is available.

The latest discovery follows a similar warning issued by eEye in March regarding major security holes in IE and Outlook. Details of those flaws were reported to Microsoft between March 16 and March 19. They remain unpatched.

Back then, Microsoft confirmed the existence of the flaws and promised to "take the appropriate action" to protect affected users once an investigation is completed. "At this time, Microsoft is not aware of any malicious attacks attempting to exploit the reported vulnerabilities, and there is no customer impact based on this issue," a spokesperson said.

Under normal circumstances, Microsoft patches are released on a monthly cycle, but in cases of emergency, the company could release an out-of-cycle update. Since adopting the monthly patching cycle in October 2003, Microsoft has released three out-of-cycle patches, all for "critical" IE flaws.

Separately, eEye also issued a warning for a high-severity bug in multiple versions of RealPlayer, the multi-media software program marketed by Seattle-based RealNetworks Inc.

"A vulnerability exists in Real Player that can allow the execution of arbitrary code if a user is coaxed into opening a specific file type," the company said. A successful exploit could lead to arbitrary code execution.

The flaw was reported to RealNetworks on May 4. A patch is not yet available.

According to Maiffret, the RealPlayer flaw is particularly dangerous to enterprises because an attacker can bypass firewalls and perimeter protection to launch an exploit directly on the desktop.

"When a code execution hole is found in a desktop application like RealPlayer, administrators should take special notice. The bad guys can basically walk right past your protections and launch his attack on the desktop," Maiffret added.

In the absence of mitigation guidance, Web surfers are encouraged to keep anti-virus and anti-spyware software updated and exercise caution when browsing.

/zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

Advertiser Disclosure:
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.